Seguir
Keith M. Martin
Keith M. Martin
Dirección de correo verificada de rhul.ac.uk - Página principal
Título
Citado por
Citado por
Año
Everyday cryptography
KM Martin
The Australian Mathematical Society 231 (6), 2012
2562012
A reputation-based announcement scheme for VANETs
Q Li, A Malip, KM Martin, SL Ng, J Zhang
IEEE Transactions on Vehicular Technology 61 (9), 4095-4108, 2012
2412012
Geometric shared secret and/or shared control schemes
GJ Simmons
Conference on the Theory and Application of Cryptography, 216-241, 1990
207*1990
On key assignment for hierarchical access control
J Crampton, K Martin, P Wild
19th IEEE Computer Security Foundations Workshop (CSFW'06), 14 pp.-111, 2006
1792006
Authentication protocols for mobile network environment value-added services
G Horn, KM Martin, CJ Mitchell
IEEE Transactions on Vehicular Technology 51 (2), 383-392, 2002
1472002
Perfect secret sharing schemes on five participants
WA Jackson, KM Martin
Designs, codes and cryptography 9, 267-286, 1996
1381996
Survey on security challenges for swarm robotics
F Higgins, A Tomlinson, KM Martin
2009 Fifth International Conference on Autonomic and Autonomous Systems, 307-312, 2009
1272009
Stability of nanometer-thick layers in hard coatings
SA Barnett, A Madan, I Kim, K Martin
Mrs Bulletin 28 (3), 169-172, 2003
1062003
Geometric secret sharing schemes and their duals
WA Jackson, KM Martin
Designs, Codes and Cryptography 4 (1), 83-95, 1994
1041994
Threats to the swarm: Security considerations for swarm robotics
F Higgins, A Tomlinson, KM Martin
International Journal on Advances in Security 2 (2&3), 2009
1022009
Multisecret threshold schemes
WA Jackson, KM Martin, CM O’Keefe
Annual International Cryptology Conference, 126-135, 1993
951993
On sharing many secrets
WA Jackson, KM Martin, CM O'Keefe
International Conference on the theory and application of cryptology, 42-54, 1994
901994
Dynamic user revocation and key refreshing for attribute-based encryption in cloud storage
Z Xu, KM Martin
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
852012
Changing thresholds in the absence of secure channels
KM Martin, J Pieprzyk, R Safavi-Naini, H Wang
Information Security and Privacy: 4th Australasian Conference, ACISP’99 …, 1999
83*1999
New secret sharing schemes from old
KM Martin
J. Combin. Math. Combin. Comput 14 (65-77), 366, 1993
821993
A combinatorial interpretation of ramp schemes
WA Jackson, KM Martin
Australasian Journal of Combinatorics 14, 51-60, 1996
661996
Ideal secret sharing schemes with multiple secrets
WA Jackson, KM Martin, CM O'keefe
Journal of Cryptology 9 (4), 233-250, 1996
601996
Efficient key predistribution for grid-based wireless sensor networks
SR Blackburn, T Etzion, KM Martin, MB Paterson
Information Theoretic Security: Third International Conference, ICITS 2008 …, 2008
592008
Bounds and techniques for efficient redistribution of secret shares to new access structures
KM Martin, R Safavi-Naini, H Wang
The Computer Journal 42 (8), 638-649, 1999
591999
Discrete structures in the theory of secret sharing
KM Martin
University of London, 1991
591991
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20